Shared Flashcard Set

Details

Security + || 2.1 Cryptography
Security + || 2.1 Cryptography
18
Computer Science
Undergraduate 4
12/10/2018

Additional Computer Science Flashcards

 


 

Cards

Term
How does Cryptography help preserve confidentiality?
Definition
Ciphertext cannot be read without the key (and correct cipher)
Term
How does Cryptography allow for authentication and control?
Definition
Assuming the key is secure, an encrypted token could only have been created by the key holder.
Term
How does Cryptography allow for Non-Repudiation?
Definition
Sender cannot deny the message as only s/he could have created it.
Term
How does Cryptography allow for Integrity and Resiliency?
Definition
As well as being unreadable, a ciphertext cannot normally be modified or substituted with a different message.
Term
What is making something obscure to a potential interceptor?
Definition
Obfuscation
Term
What converts plaintext into ciphertext?
Definition
Cipher
Term
What can be used to control the operation of the cipher?
Definition
Key
Term
What is the art of breaking or "cracking" cryptographic systems?
Definition
Cryptanalysis
Term
What is a One Time Pad?
Definition
Message and key are same size.

It is impossible to crack if sufficiently random.

Is only used one time.
Term
What is adding extra bits to a hash, to make similar hashes not appear the same?
Definition
Salting
Term
What is 128 bit encryption that can move up to 256 bit keys?
Definition
Advanced Encryption Standard (AES)
Term
What are the following elements of?:

oIf the public key encrypts, only the private key can decrypt

oIf the private key encrypts, only the public key can decrypt

oPrivate key cannot be derived from the public key

oPrivate key must be kept secret

oPublic key is easy to distribute (anyone can have it)
Definition
Asymmetric Encryption
Term
Same secret key is used for encryption and decryption.
Definition
Symmetric Encryption
Term
Certificate Authority
Definition
CA
Term
Root CA is always offline unless what?
Definition
They have to issue a new intermediate certification or reissue an intermediate certification.
Term
What allows for a Man-in-the-Middle (MitM) attack?
Definition
Inadequate authentication and message integrity.
Term
What is a CRL?
Definition
Certificate Revocation List
Term
What are found in CRLs?
Definition
Specific Certificates
Supporting users have an ad free experience!